Technical requirements and test methods for cybersecurity of electric vehicle charging system
1 Scope
This standard specifies the technical requirements and test methods for cybersecurity of electric vehicle charging system.
This standard is applicable to the design, development and test for cybersecurity of electric vehicle charging system.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes requirements of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GB/T 5271.8-2001 Information technology - Vocabulary - Part 8: Security
GB/T 27930 Communication protocols between off-board conductive charger and battery management system for electric vehicle
GB/T 29246-2017 Information technology - Security techniques - Information security management systems - Overview and vocabulary
GB/T 35273-2020 Information security technology - Personal information security specification
GB/T 37935-2019 Information security technology - Trusted computing specification - Trusted software base
GB/T 40861-2021 General technical requirements for vehicle cybersecurity
3 Terms and definitions
For the purposes of this document, the terms and definitions given in GB/T 29246-2017, GB/T 37935-2019, GB T 35273-2020, GB/T 40861-2021 and the following apply.
3.1
charging system
related functional system for charging power batteries in electric vehicle
Note 1: it is also known as in-vehicle charging system.
Note 2: depending on the charging method and technical architecture, the charging system may include one or more on-board controllers [such as Battery Management System (BMS), On-board Charger (OBC), Wireless Power Transfer (WPT)], or other on-board communication control units that integrate related charging functions.
3.2
important data
data recognized as the cause of the risk of the in-vehicle charging system based on the charging function design and risk assessment, including personal sensitive information and important safety parameters
3.3
personal sensitive information
personal information which, once disclosed, illegally provided or abused, will possibly endanger the personal and property safety and easily result in damages to personal reputation and physical and mental health or result in discriminatory treatment
[Source: GB/T 35273-2020, 3.2]
3.4
security important parameter
security-related information, including authentication data such as secret key and private key, passwords, or other password-related parameters
[Source: GB/T 40861-2021, 3.13]
3.5
out-of-vehicle communication
communication between the charging system and the outside of the vehicle
Note: out-of-vehicle communication of charging system includes communication of conductive charging mode and communication of non-conductive charging mode, etc.
3.6
in-vehicle communication
communication between the controllers of the charging system and the electronic and electrical system in the vehicle
Note: including the in-vehicle communication based on CAN, CAN-FD, LIN, on-board Ethernet, etc.
3.7
entity of root of trust
functional module used to support the establishment and transfer of trust chain of trusted computing platform, and can provide external services such as integrity measurement, secure storage, cryptographic computation, etc.
Note: entity of root of trust includes TPCM, TCM, TPM, etc.
[Source: GB/T 37935-2019, 3.12]
3.8
confidentiality
property that information is not available or disclosed to unauthorized individuals, entities, or processes
[Source: GB/T 29246-2017, 2.12]
3.9
integrity
property of accuracy and completeness
[Source: GB/T 29246-2017, 2.40]
3.10
authentication
identity confirmation, which enables the data processing system to identify the testing implementation process of the entity
[Source: GB/T 5271.8-2001, 08.04.12]
4 Abbreviations
For the purposes of this document, the following abbreviations apply.
BGA: Ball Grid Array
BMS: Battery Management System
CAN: Controller Area Network
CAN-FD: CAN with Flexible Data-rate
ECU: Electronic Control Unit
JTAG: Joint Test Action Group
LGA: Land Grid Array
LIN: Local Interconnect Network
MCU: Micro Control Unit
OBC: On-board Charger
OTP: One Time Programmable
SPI: Serial Peripheral Interface
TCM: Trusted Cryptography Module
TPM: Trusted Platform Module
TPCM: Trusted Platform Control Module
USB: Universal Serial Bus
UART: Universal Asynchronous Receiver/Transmitter
WPT: Wireless Power Transfer
5 Technical requirements for cybersecurity of electric vehicle charging system
Technical requirements and test methods for cybersecurity of electric vehicle charging system
1 Scope
This standard specifies the technical requirements and test methods for cybersecurity of electric vehicle charging system.
This standard is applicable to the design, development and test for cybersecurity of electric vehicle charging system.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes requirements of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GB/T 5271.8-2001 Information technology - Vocabulary - Part 8: Security
GB/T 27930 Communication protocols between off-board conductive charger and battery management system for electric vehicle
GB/T 29246-2017 Information technology - Security techniques - Information security management systems - Overview and vocabulary
GB/T 35273-2020 Information security technology - Personal information security specification
GB/T 37935-2019 Information security technology - Trusted computing specification - Trusted software base
GB/T 40861-2021 General technical requirements for vehicle cybersecurity
3 Terms and definitions
For the purposes of this document, the terms and definitions given in GB/T 29246-2017, GB/T 37935-2019, GB T 35273-2020, GB/T 40861-2021 and the following apply.
3.1
charging system
related functional system for charging power batteries in electric vehicle
Note 1: it is also known as in-vehicle charging system.
Note 2: depending on the charging method and technical architecture, the charging system may include one or more on-board controllers [such as Battery Management System (BMS), On-board Charger (OBC), Wireless Power Transfer (WPT)], or other on-board communication control units that integrate related charging functions.
3.2
important data
data recognized as the cause of the risk of the in-vehicle charging system based on the charging function design and risk assessment, including personal sensitive information and important safety parameters
3.3
personal sensitive information
personal information which, once disclosed, illegally provided or abused, will possibly endanger the personal and property safety and easily result in damages to personal reputation and physical and mental health or result in discriminatory treatment
[Source: GB/T 35273-2020, 3.2]
3.4
security important parameter
security-related information, including authentication data such as secret key and private key, passwords, or other password-related parameters
[Source: GB/T 40861-2021, 3.13]
3.5
out-of-vehicle communication
communication between the charging system and the outside of the vehicle
Note: out-of-vehicle communication of charging system includes communication of conductive charging mode and communication of non-conductive charging mode, etc.
3.6
in-vehicle communication
communication between the controllers of the charging system and the electronic and electrical system in the vehicle
Note: including the in-vehicle communication based on CAN, CAN-FD, LIN, on-board Ethernet, etc.
3.7
entity of root of trust
functional module used to support the establishment and transfer of trust chain of trusted computing platform, and can provide external services such as integrity measurement, secure storage, cryptographic computation, etc.
Note: entity of root of trust includes TPCM, TCM, TPM, etc.
[Source: GB/T 37935-2019, 3.12]
3.8
confidentiality
property that information is not available or disclosed to unauthorized individuals, entities, or processes
[Source: GB/T 29246-2017, 2.12]
3.9
integrity
property of accuracy and completeness
[Source: GB/T 29246-2017, 2.40]
3.10
authentication
identity confirmation, which enables the data processing system to identify the testing implementation process of the entity
[Source: GB/T 5271.8-2001, 08.04.12]
4 Abbreviations
For the purposes of this document, the following abbreviations apply.
BGA: Ball Grid Array
BMS: Battery Management System
CAN: Controller Area Network
CAN-FD: CAN with Flexible Data-rate
ECU: Electronic Control Unit
JTAG: Joint Test Action Group
LGA: Land Grid Array
LIN: Local Interconnect Network
MCU: Micro Control Unit
OBC: On-board Charger
OTP: One Time Programmable
SPI: Serial Peripheral Interface
TCM: Trusted Cryptography Module
TPM: Trusted Platform Module
TPCM: Trusted Platform Control Module
USB: Universal Serial Bus
UART: Universal Asynchronous Receiver/Transmitter
WPT: Wireless Power Transfer
5 Technical requirements for cybersecurity of electric vehicle charging system